AboutDFIR.com – The Definitive Compendium Project
Digital Forensics & Incident Response

Showing 1-33 of 33 Books
Applied Incident Response Applied Incident Response

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective...

Computers Steve Anson
Blue Team Field Manual (BTFM) Blue Team Field Manual (BTFM)

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond,...

Computers Alan White
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals Cloud Forensics Demystified: Decoding cloud investigation complexities for...

Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approaches

Key Features

  • Uncover the...
Ganesh Ramakrishnan (Author), Mansoor Haqanee (Author)
Crafting the InfoSec Playbook

This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own...

Jeff Bollinger, Brandon Enright, & Matthew Valites
Cybercrime and Digital Forensics Cybercrime and Digital Forensics

"Types of hardware, peripherals, and electronic evidence" -- "Evidence integrity" -- "Summary" -- "13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE" -- "Introduction" -- "Data preservation" -- "Digital forensic imaging tools"...

Computer crimes Thomas J. Holt
Digital Forensics and Incident Response – Second Edition Digital Forensics and Incident Response – Second Edition

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware...

Computers Gerard Johansen
Digital Forensics for Legal Professionals Digital Forensics for Legal Professionals

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics...

Computers Lars E. Daniel
Digital Forensics with Open Source Tools Digital Forensics with Open Source Tools

Based on the use of open source tools, this book lends itself to many organizations as well as students who do not have means to purchase new tools for different...

Computers Cory Altheide
Diving In – An Incident Responder’s Journey: A...

Digital Forensic science, commonly referred to as digital or computer forensics, is the branch of forensic science that deals with the collection, analysis, and preservation of digital data — evidence...

Computer crimes, Computer security, Law Devon Ackerman
EnCase Computer Forensics EnCase Computer Forensics

The official, Guidance Software-approved book on the newest EnCE exam!

The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as...

Computers Steve Bunting
File System Forensic Analysis File System Forensic Analysis

Moves beyond the basics and shows how to use tools to recover and analyze forensic evidence.

Computers Brian Carrier
Handbook of Digital Forensics and Investigation Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation...

Computers Eoghan Casey
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics,...

Computers Kevin Mandia
Incident Response Techniques for Ransomware Attacks Incident Response Techniques for Ransomware Attacks

Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features:...

Computer security, Computers Oleg Skulkin
Incident Response with Threat Intelligence Incident Response with Threat Intelligence

Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence Key Features: Understand best practices for detecting, containing, and recovering from modern...

Roberto Martinez
Intelligence-driven Incident Response Intelligence-driven Incident Response

Threat intelligence—understanding the who, why, and how of attacks—is most valuable when applied directly to an organization’s incident response capability for hunting and investigation. Threat intelligence has become more common...

Computers Scott J. Roberts
Investigating Windows Systems Investigating Windows Systems

Investigating Windows Systems helps readers discover the detailed tools they will need to perform research. It provides a walk-through of the analysis process, with descriptions of thought processes and an...

Law Harlan Carvey
Linux Field Manual (LFM) Linux Field Manual (LFM)

A reference manual for Linux that has descriptions of core functions and and has command line tools, with popular applications such as docker and kubectl

Computers Tim Bryant
Mastering Python Forensics Mastering Python Forensics

Master the art of digital forensics and analysis with PythonAbout This Book- Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of...

Computer crimes Michael Spreitzenbarth
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition Mobile Forensic Investigations: A Guide to Evidence Collection,...

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the tools...

Computers Lee Reiber
OS X Incident Response OS X Incident Response

" OS X Incident Response: Scripting and Analysis" is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of...

Jaron Bradley
Practical Linux Forensics Practical Linux Forensics

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into...

Computers Bruce Nikkel
Practical Malware Analysis Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones...

Computers Michael Sikorski
Practical Mobile Forensics – Fourth Edition Practical Mobile Forensics – Fourth Edition

Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Key Features Apply advanced forensic techniques to recover deleted...

Computers Rohit Tamma
Red Team Field Manual (RTFM) Red Team Field Manual (RTFM)

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the...

Computer security Ben Clark
SQLite Forensics SQLite Forensics

SQLite is a self-contained SQL database engine that is used on every smartphone (including all iOS and Android devices) and most computers (including all Macs and Windows 10 machines). Each...

Paul Sanderson
The Art of Cyberwarfare The Art of Cyberwarfare

A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves...

Computers Jon DiMaggio
The Art of Memory Forensics The Art of Memory Forensics

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the...

Computers Michael Hale Ligh
The Basics of Digital Forensics The Basics of Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is,...

Computers John Sammons
Troubleshooting with the Windows Sysinternals Tools Troubleshooting with the Windows Sysinternals Tools

For nearly two decades, IT professionals have considered the free Sysinternals tools absolutely indispensable for diagnosing, troubleshooting, and deeply understanding the Windows platform. Today, with new tools and many enhancements...

Computers Mark Russinovich
Windows Internals Windows Internals

Delve inside Windows architecture and internals - and see how core components work behind the scenes. This classic guide has been fully updated for Windows 8.1 and Windows Server 2012...

Computers Brian Catlin
Windows Internals, Part 2 Windows Internals, Part 2

Drill down into Windows architecture and internals, discover how core Windows components work behind the scenes, and master information you can continually apply to improve architecture, development, system administration, and...

Computers Mark Russinovich